<?xml version='1.0' encoding='utf-8'?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->

<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
    please see http://xml.resource.org/authoring/README.html. -->
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="std"
      docName="draft-guthrie-ipsecme-ikev2-hybrid-auth-00"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3"
	  consensus="true">
  <!-- xml2rfc v2v3 conversion 2.38.1 -->
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN" 
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the 
        full title is longer than 39 characters -->

   <title abbrev="Hybrid Non-Composite Auth in IKEv2">Hybrid Non-Composite Authentication in IKEv2</title>
    <seriesInfo name="Internet-Draft" value="draft-guthrie-ikev2-hybrid-non-composite-auth"/>
    <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->
    <author fullname="Rebecca Guthrie" initials="R." surname="Guthrie">
      <organization abbrev="NSA">National Security Agency</organization>
      <address>
        <email>rmguthr@uwe.nsa.gov</email>
      </address>
	</author>
	
    <date year="2022"/>

   <abstract>
      <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow hybrid non-composite authentication. The intended purpose for this extension is to enable the use of a Post-Quantum (PQ) digital signature and X.509 certificate in addition to the use of a traditional authentication method. This document enables peers to signify support for hybrid non-composite authentication, and send additional CERTREQ, AUTH, and CERT payloads to perform multiple authentications.
	  </t>
    </abstract>
  </front>
  
  <middle>
  
    <section numbered="true" toc="default">
      <name>Introduction</name>
	  <t>This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow negotiation of authentication methods, including hybrid authentication. The intended purpose for this extension is to enable the use of a Post-Quantum (PQ) digital signature and X.509 certificate in addition to the use of a traditional authentication method. This document is motivated by <xref target="I-D.draft-becker-guthrie-noncomposite-hybrid-auth" format="default"/> and the multiple authentication mechanism for IKEv2 introduced in <xref target ="RFC4739" format="default"/>, and specifies how to perform multiple authentications, with each authentication using its own CERT AND AUTH payloads. This document also leverages the supported authentication method announcement specified in <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/>.
	  </t>
	</section>
	  
    <section numbered="true" toc="default">
      <name>Terminology and Notation</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in capitals, as shown here.
	  </t>
    </section>
	  
    <section numbered="true" toc="default">
	  <name>Protocol Details</name>
	
	  <section numbered="true" toc="default">
	    <name>Exchanges</name>
		<t>If the responder is willing to use this extension, it includes a new HYBRID_AUTH Notify payload in the response message of the IKE_SA_INIT exchange. The inclusion of N(HYBRID_AUTH) in the responder’s IKE_SA_INIT message indicates to the initiator that the responder can perform multiple authentications using multiple AUTH and CERT payloads. Additionally, the responder includes in IKE_SA_INIT a SUPPORTED_AUTH_METHODS Notify payload as defined in <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/>. If a peer sends N(HYBRID_AUTH), it MUST also send N(SUPPORTED_AUTH_METHODS). If the initiator does not support this extension and the extension indicated through inclusion of N(SUPPORTED_AUTH_METHODS), it MUST ignore the received N(HYBRID_AUTH) notification. If the initiator supports this extension, it MAY include N(HYBRID_AUTH) and N(SUPPORTED_AUTH_METHODS) in its IKE_AUTH message, indicating to the responder that it can perform multiple authentications using multiple AUTH and CERT payloads. Additionally, the initiator MAY send in the IKE_AUTH message additional AUTH and CERT payloads based on information conveyed in the responder’s SUPPORTED_AUTH_METHODS Notify payload, in order for the responder to perform multiple authentications. If the initiator includes N(HYBRID_AUTH) and N(SUPPORTED_AUTH_METHODS) in its IKE_AUTH message, the responder MAY also send additional AUTH and CERT payloads based on these, in order for the initiator to perform multiple authentications. Note that Figure 1 illustrates the scenario where both initiator and responder support N(HYBRID_AUTH) and both choose to do a single additional authentication. Section 3.5 illustrates what the responder IKE_AUTH message looks like in the case that more than two AUTH payloads and corresponding CERT payloads are sent.
		</t>
        <figure anchor="fig1">
		  <artwork name="" type="" align="left" alt=""><![CDATA[
Initiator                       Responder
-----------                     -----------
HDR, SAi1, KEi, Ni -->

                                <-- HDR, SAr1, KEr, Nr,
				    [CERTREQ,],[N(HYBRID_AUTH),]  
                                    [N(SUPPORTED_AUTH_METHODS)]
HDR, SK {IDi, [CERT,] 
[CERTREQ,] [IDr,] AUTH,
SAi2, TSi, TSr, [N(HYBRID_AUTH),]
N(SUPPORTED_AUTH_METHODS),]
[CERT,] [AUTH] -->
                                <-- HDR, SK {IDr, [CERT,] AUTH,
                                    SAr2, TSi, TSr, [CERT,] [AUTH]}
		
    Figure 1: IKE_SA_INIT and IKE_AUTH Exchanges
		
	     ]]></artwork>
	    </figure>
	    <t>If the responder sends N(HYBRID_AUTH) in IKE_SA_INIT or the initiator sends N(HYBRID_AUTH) in IKE_AUTH but N(SUPPORTED_AUTH_METHODS) is missing from the message, the responding peer SHOULD ignore the N(HYBRID_AUTH) Notify Payload and proceed as if the other peer does not support this extension.
	    </t>
	  
	    <section numbered="true" toc="default">
	      <name>Exchanges using IKE_INTERMEDIATE</name>
		  <t>When PQ cryptography is incorporated into IKEv2, either during the key establishment phase or for authentication, it is suspected that the increased size of PQ KEMs and digital signatures will cause IP fragmentation. Though <xref target="RFC7383" format="default"/> mitigates this issue for the IKE_AUTH exchange through deploying fragmentation at the IKEv2 layer instead, its fragmentation mechanism functions only on encrypted payloads, and therefore does not extend to the IKE_SA_INIT exchange.
          </t>
          <t><xref target="I-D.draft-ietf-ipsecme-ikev2-intermediate" format="default"/> introduces an IKE_INTERMEDIATE exchange that follows IKE_SA_INIT and precedes IKE_AUTH. IKE_INTERMEDIATE leverages the key establishment of the IKE_SA_INIT exchange and can be used to send larger data that would not fit in an IKE_SA_INIT message without causing IP fragmentation.
		  </t>
		  <t>In the case that N(SUPPORTED_AUTH_METHODS) is large enough to cause fragmentation of the responder’s IKE_SA_INIT message, or in the case that the peers are using IKE_INTERMEDIATE for some other purpose, the responder will send the data from N(SUPPORTED_AUTH_METHODS) in IKE_INTERMEDIATE instead of IKE_SA_INIT, as described in <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/>. In this case, the responder sends an empty N(SUPPORTED_AUTH_METHODS) payload in IKE_SA_INIT, which signals to the initiator to begin the IKE_INTERMEDIATE. In the responder’s IKE_INTERMEDIATE response, it will again send N(SUPPORTED_AUTH_METHODS), but with a non-empty Notification Data field, where it lists supported authentication methods announcements.
		  </t>
		  <t>When IKE_INTERMEDIATE is used, the responder MUST use it to send N(HYBRID_AUTH) in the same manner as N(SUPPORTED_AUTH_METHODS). That is, the responder will send an empty HYBRID_AUTH Notify Payload in IKE_SA_INIT, and then send a non-empty N(HYBRID_AUTH) in its IKE_INTERMEDIATE response message.
		  </t>
		  <t>Figure 2 shows the IKE_SA_INIT, IKE_INTERMEDIATE, and IKE_AUTH exchanges when N(HYBRID_AUTH) and N(SUPPORTED_AUTH_METHODS) are sent using IKE_INTERMEDIATE. Note that both Notify Payloads in the responder’s IKE_SA_INIT message are empty, and both Notify Payload’s in the responder’s IKE_INTERMEDIATE message contain data.
		  </t>
		  <figure anchor="fig2">
		    <artwork name="" type="" align="left" alt="">
			<![CDATA[
Initiator                         Responder
-----------                       -----------
HDR, SAi1, KEi, Ni -->
                                  <-- HDR, SAr1, KEr, Nr,
                                      [CERTREQ,]
				      [N(HYBRID_AUTH),]
				      [N(SUPPORTED_AUTH_METHODS)]
HDR, SK {…} -->
                                  <-- HDR, SK{…
                                      [N(HYBRID_AUTH),]
                                      [N(SUPPORTED_AUTH_METHODS)}
HDR, SK {IDi, [CERT,]
[CERTREQ,] [IDr,] AUTH,
SAi2, TSi, TSr,[N(HYBRID_AUTH),]
[N(SUPPORTED_AUTH_METHODS),]
[CERT,] [AUTH]} -->
                                  <-- HDR, SK {IDr, [CERT,] AUTH,
                                      SAr2, TSi, TSr, [CERT,] [AUTH]}
											  
Figure 2: IKE_SA_INIT, IKE_INTERMEDIATE, and IKE_AUTH Exchanges

	        ]]></artwork>
		  </figure>
		  <t>Furthermore, the use of IKE_INTERMEDIATE alters IKEv2’s authentication mechanism, as specified in <xref target="I-D.draft-ietf-ipsecme-ikev2-intermediate" format="default"/>. If the IKE_INTERMEDIATE exchange is used, care must be taken to apply this modified authentication mechanism to all authentications that are performed with this extension.
		  </t>
	    </section>
	  
	  </section>
	  
	  <section numbered="true" toc="default">
	    <name>SUPPORTED_AUTH_METHODS Notify Payload</name>
		<t>The SUPPORTED_AUTH_METHODS Notify payload as defined in <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/> is a status notification payload with type TBA; it has a protocol ID of 0 and no Security Parameter Index (SPI). The Notification Data field is defined in <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/>, and is called List of Supported Auth Methods Announcements. It contains the list of supported authentication methods, where each item in the list is called an announcement. Each announcement is a variable-sized blob, whose format depends on the announced authentication method. Authentication methods are represented as values from the “IKEv2 Authentication Method” registry defined in <xref target="IKEV2IANA" format="default"/>. <xref target="I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/> defines three formats for announcements, each of different lengths. The shortest (2 octets) is used for authentication methods “Shared Key Message Integrity Code” (2) and “NULL Authentication” (13). The second (3 octets) is used for “RSA Digital Signature” (1), “DSS Digital Signature” (3), “ECDSA with SHA-256 on the P-256 curve” (9), “ECDSA with SHA-384 on the P-384 curve” (10) and “ECDSA with SHA-512 on the P-521 curve (11). The last (multi-octet) is used with the “Digital Signature” (14) authentication method defined in <xref target="RFC7427" format="default"/>.
		</t>
		<t>If a peer sends N(HYBRID_AUTH), it MUST also send N(SUPPORTED_AUTH_METHODS). The peer includes announcements for all supported authentication methods in N(SUPPORTED_AUTH_METHODS), and the data in N(HYBRID_AUTH) provides the context necessary for the receiving peer to parse the authentication methods presented in N(SUPPORTED_AUTH_METHODS) in the context of performing multiple authentications.
		</t>
		<t>N(SUPPORTED_AUTH_METHODS) contains a list of authentication methods the sender supports. For each authentication the sender would like performed, the options for that authentication should be listed consecutively. The options for that authentication should also be listed in order of most preferred to least preferred. The sets of options should themselves appear in order of most preferred authentication to least preferred authentication (i.e., options for the authentication that would be most preferable if only one authentication would occur should be listed first, and so on).
		</t>
		<t>For example, if a peer would like two authentications to be performed, where options for the first authentication are “ECDSA with SHA-384 on the P-384 curve (10)” or “ECDSA with SHA-512 on the P-521 curve (11) (where ECDSA with SHA-512 on the P-521 curve is most preferred) and options for the second authentication are three choices of PQ digital signature: PQ_a, PQ_b, PQ_c (where PQ_b is most preferred, followed by PQ_c, then PQ_a), and with a preference for PQ authentication over traditional authentication in the case that the receiving peer only performs a single authentication, the announcements for these methods should appear in the following order: PQ_b, PQ_c, PQ_a, ECDSA with SHA-512 on the P-521 curve, ECDSA with SHA-384 on the P-384 curve.</t>
		<t>Author’s Note: What authentication method will be used for PQ signatures? Will a new IANA value be defined, or will PQ signatures use the Digital Signature (14) Authentication Method value? If it is the former, announcements for PQ authentication may fit into the 3 octet announcement template (along with the other certificate-based authentication methods).
		</t>
	  </section>
	  
	  <section numbered="true" toc="default">
	    <name>HYBRID_AUTH Notify Payload</name>
		<t>The HYBRID_AUTH Notify payload is a status notification payload with the type TBA. It has a protocol ID of 0 and no Security Parameter Index (SPI). Data consists of two fields. The first is one octet and is used to indicate how many authentications a peer would prefer the other peer select from the supported authentication methods it lists in the N(SUPPORTED_AUTH_METHODS) payload. The second field tells a peer how to select authentication methods from the list of announcements made in N(SUPPORTED_AUTH_METHODS).
		</t>
		<t>The value of the # of Auths field MUST be at least two. If the value of this field is 0 of 1, this Notify Payload SHOULD be ignored and the receiving peer should proceed as if the sending peer does not support this extension. In the case that the receiving peer decides not to ignore this Notify Payload, it MUST check the Indices field and determine whether the Indices field is a reasonable length (i.e., contains between one and seven indices). If the Indices field is a reasonable length, the receiving peer MAY ignore only the # of Auths field and proceed based on the values in the Indices field. Otherwise, the receiving peer MUST ignore the Notify Payload.
		</t>
		<t>
		The value(s) in the subsequent Indices field tells the peer which authentication methods it may select from N(SUPPORTED_AUTH_METHODS) if it agrees to using this extension. It works as follows: for each authentication the sending peer would like to have performed, the Indices field lists the index of the top choice for each authentication, with the exception of the top choice for the first authentication (which will always coincide with the first announcement). Then, for each authentication that the receiving peer agrees to, it can appropriately select an authentication method from each sub-list. If a peer receives the list enumerated in the previous section, the # of Auths field in the corresponding HYBRID_AUTH Notify Payload will be two, and the Indices field will be 3. Then, if this peer agrees to perform two authentications and supports at least one authentication method presented for each authentication, it will select one authentication method from the first sub-list, which is announcements 0, 1, and 2, and one authentication method from the second sub-list, which is announcements 3 and 4. If the receiving peer does not support at least one authentication method from each sub-list or does not wish to perform the number of authentications preferred by the sending peer, it MAY select an authentication method from a subset of these sub-lists, rather than an authentication method from each. If the receiving peer wishes to perform only one authentication, it can perform, for example, only the PQ_b authentication, rather than the PQ_a/b/c authentication in conjunction with either ECDSA with SHA-512 on the P-521 curve or ECDSA with SHA-384 on the P-384 curve. If the receiving peer does not support at least one authentication method from each sub-list or does not wish to perform as many authentications as preferred by the sending peer, it SHOULD attempt to choose an authentication method that is preferred by the sending peer.
		</t>
		<figure anchor="fig3">
		    <artwork name="" type="" align="left" alt=""><![CDATA[
                        1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Next Payload  |C|  RESERVED   |         Payload Length        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Protocol ID(=0)| SPI Size (=0) | Notify Message Type (=16404)  |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |  # of Auths   |                                               |
 +-+-+-+-+-+-+-+-+                                               |
 ~                             Indices                           ~
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   
          Figure 3: HYBRID_AUTH Notify Payload Format
	        ]]></artwork>
		</figure>
	  </section>
	  
	  <section numbered="true" toc="default">
	    <name>CERTREQ Payload</name>
		<t>The CERTREQ payload contains the IKE header, the certificate encoding being requested, and the encoding of an acceptable certification authority (CA) for the type of certificate requested <xref target="RFC7296" format="default"/>. The CA field is a concatenated list of hashes of the public keys of trusted CAs, where each is encoded as the SHA-1 hash of the Subject Public Key Info element from each Trust Anchor certificate. Subject Public Key Info contains signatureAlgorithm which identifies the cryptographic algorithm used by the CA to sign the certificate. Multiple CERTREQ payloads MAY be sent in order to accommodate multiple values for certificate encodings, but a single CERTREQ payload can contain requests corresponding to certificates used with both traditional and PQ authentication, provided that they use the same certificate encoding.
		</t>
	  </section>
	  
	  <section numbered="true" toc="default">
	    <name>Additional AUTH Payload</name>
		<t>The AUTH payload, as specified in <xref target="RFC7296" format="default"/>, contains an IKE header, the authentication method, reserved bits, and authentication data. Additional AUTH payloads MUST use the same AUTH payload format as is defined in <xref target="RFC7296" format="default"/>. AUTH payloads MAY use the same authentication method. AUTH payloads sent by a peer SHOULD use authentication methods announced by the other peer in N(SUPPORTED_AUTH_METHODS). For each AUTH payload a peer sends that is using an authentication method that requires a CERT payload, there MUST be at least one CERT payload accompanying that AUTH payload. There may be more than one CERT payload per AUTH payload if certificate chains are sent.
		</t>
		<t>When additional AUTH and CERT payloads are sent in support of multiple authentications, all additional AUTH and CERT payloads MUST be sent at the end of the IKE_AUTH message. Each additional AUTH payload MUST be directly preceded by the CERT payloads that are used during that authentication.
		</t>
		<t>When a peer receives multiple sets of AUTH and CERT payloads, they SHOULD perform all authentications. It is left to the individual implementation to decide whether or not to proceed if some but not all authentications are performed, or some but not all authentications succeed. If no authentications succeed, the connection MUST be dropped.
		</t>
	  </section>
	  
	  <section numbered="true" toc="default">
	    <name>Additional CERT Payload</name>
		<t>The CERT payload contains the IKE header, the certificate encoding, and the certificate data <xref target="RFC7296" format="default"/>.
		</t>
		<t>Though this document refers to a single traditional CERT payload and a single PQ CERT payload, it is often the case that multiple CERT payloads are sent in response to a single CERTREQ in order to provide a certificate chain.
		</t>
		<t><xref target="RFC7296" format="default"/> states that if more than one CERT payload is used for authentication, the first CERT payload MUST contain the public key used to verify the AUTH payload. The remaining CERT payloads need not be in any particular order.
		</t>
		<t>If additional AUTH and CERT payloads are sent in support of multiple authentications, all additional AUTH and CERT payloads MUST be sent at the end of the IKE_AUTH message. Each set of CERT payloads used in a single authentication MUST be listed consecutively, beginning with the end entity certificate, and be immediately followed by the relevant AUTH payload. If more than two sets of AUTH and CERT payloads are sent, each additional AUTH payload acts as a delimiter which groups together CERT payloads containing certificates that belong to the same certificate chain.
		</t>
		<t>For example, if the responder sent three sets of AUTH and CERT payloads, the responder’s IKE_AUTH message appear as shown in Figure 4.
		</t>
		<figure anchor="fig4">
		    <artwork name="" type="" align="left" alt=""><![CDATA[
Initiator                     Responder
-----------                   -----------
                              <-- HDR, SK {IDr, [CERT,] AUTH,
                                  SAr2, TSi, TSr, [CERT,] [AUTH,]
                                  [CERT,] [AUTH]}
										  
Figure 4: Responder's IKE_AUTH message with three authentications

	        ]]></artwork>
		</figure>
		<t>In the case that more than one authentication uses X.509 certificates, the peer in receipt of these certificates MUST confirm that the SANs match in all end entity certificates.
		</t>
		<t>For guidance on performing validation of multiple certificate chains, refer to <xref target="I-D.draft-becker-guthrie-noncomposite-hybrid-auth" format="default"/>.
		</t>
	  </section>
	  
	</section>
	  
	<section anchor="Security" numbered="true" toc="default">
	  <name>Security Considerations</name>
	  <t>It is likely that the Post-Quantum AUTH and CERT payloads will cause the IKE_AUTH message to exceed the supported message size, requiring use of <xref target="RFC7383" format="default"/>. Thus, this document inherits the security concerns of both <xref target="RFC7296" format="default"/> and <xref target="RFC7383" format="default"/>. This document also incorporates <xref target="I-D.draft-ietf-ipsecme-ikev2-intermediate" format="default"/> and <xref target=
	  "I-D.draft-ietf-ipsecme-ikev2-auth-announce" format="default"/>, so it inherits these security considerations as well.
	  </t>
	  <t>All hybrid implementations are vulnerable to a downgrade attack in which a malicious peer does not express support for PQ algorithms, resulting in an exchange that can only rely upon traditional algorithms for security. Other concerns may arise through the use of multiple certificate chains and digital signatures, as considered in <xref target="I-D.draft-becker-guthrie-noncomposite-hybrid-auth" format="default"/>.
	  </t>
	  <t>Last, it is worth noting that a DoS attack could be conducted through this document’s use of the N(SUPPORTED_AUTH_METHODS) sent in the IKE_SA_INIT exchange, where a malicious responder could send a long list of authentication announcements.
	  </t>
	</section>

    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document defines a new Notify Message Type in the "IKEv2 Notify Message Types - Status Types" registry <xref target="IKEV2IANA" format="default"/>:
	  </t>
	  <artwork name="" type="" align="left" alt=""><![CDATA[
<TBA>                         HYBRID_AUTH	  
	  ]]></artwork>
    </section>
  
  </middle>
  
  
  <!--  *****BACK MATTER ***** -->

 <back>
    <!-- References split into informative and normative -->

   <references>
      <name>References</name>
	  <references>
	    <name>Normative References</name>
        <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7296.xml"/>
	    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7383.xml"/>
  	    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
	    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>
	    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7427.xml"/>
		<reference anchor="I-D.draft-ietf-ipsecme-ikev2-auth-announce" target="https://datatracker.ietf.org/doc/draft-ietf-ipsecme-ikev2-auth-announce/">
         <front>
            <title>Announcing Supported Authentication Methods in IKEv2</title>
            <!--<seriesInfo name="CNSSP" value="15"/>-->
            <author initials="V." surname="Smyslov" fullname="V. Smyslov">
              <organization/>
            </author>
            <date month="February" year="2022"/>
         </front>
		 <refcontent>draft-ietf-ipsecme-ikev2-auth-announce-00 (work in progress)</refcontent>
        </reference>
		<reference anchor="I-D.draft-ietf-ipsecme-ikev2-intermediate" target="https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-ikev2-intermediate-10">
         <front>
            <title>Intermediate Exchange in the IKEv2 Protocol</title>
            <!--<seriesInfo name="CNSSP" value="15"/>-->
            <author initials="V." surname="Smyslov" fullname="V. Smyslov">
              <organization/>
            </author>
            <date month="March" year="2022"/>
         </front>
		 <refcontent>draft-ietf-ipsecme-ikev2-intermediate-10 (work in progress)</refcontent>
        </reference>	
        <reference anchor="IKEV2IANA" target="https://www.iana.org/assignments/ikev2-parameters/">
		  <front>
		    <title>Internet Key Exchange Version 2 (IKEv2) Parameters</title>
			<author>
			  <organization>IANA</organization>
			</author>
		  </front>
        </reference>		
	  </references>
	  <references>
	    <name>Informative References</name>
	    <xi:include href="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4739.xml"/>
<!-- 	  <reference anchor="I-D.draft-ounsworth-pq-composite-keys" target="https://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-keys/">
         <front>
            <title>Composite Public and Private Keys For Use In Internet PKI</title>
            <author initials="M." surname="Ounsworth" fullname="M. Ounsworth">
              <organization/>
            </author>
			<author initials="M." surname="Pala" fullname="M. Pala">
              <organization/>
            </author>
            <date month="February" year="2022"/>
         </front>
		 <refcontent>draft-ounsworth-pq-composite-keys-01 (work in progress)</refcontent>
      </reference>	  
	  <reference anchor="I-D.draft-ounsworth-pq-composite-sigs" target="https://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-sigs/06/">
         <front>
            <title>Composite Signatures For Use In Internet PKI</title>
            <author initials="M." surname="Ounsworth" fullname="M. Ounsworth">
              <organization/>
            </author>
			<author initials="M." surname="Pala" fullname="M. Pala">
              <organization/>
            </author>
            <date month="February" year="2022"/>
         </front>
		 <refcontent>draft-ounsworth-pq-composite-sigs-06 (work in progress)</refcontent>
      </reference>
	  <reference anchor="I-D.draft-ounsworth-pq-composite-encryption" target="https://datatracker.ietf.org/doc/draft-ounsworth-pq-composite-encryption/">
	     <front>
		   <title>Composite Encryption for Use in Internet PKI</title>
		   <author initials="M." surname="Ounsworth" fullname="M. Ounsworth">
		     <organization/>
		   </author>
		   <author initials="J." surname="Gray" fullname="J. Gray">
		     <organization/>
		   </author>
		   <author initials="S." surname="Mister" fullname="S. Mister">
		     <organization/>
		   </author>
		   <date month="February" year="2022"/>
		 </front>
		 <refcontent>draft-ounsworth-pq-composite-encryption-01 (work in progress)</refcontent>
	  </reference>
	  <reference anchor="I-D.draft-ounsworth-pq-explicit-composite-keys" target="https://datatracker.ietf.org/doc/html/draft-ounsworth-pq-explicit-composite-keys">
	     <front>
		   <title>Explicit Pairwise Composite Keys for Use in Internet PKI</title>
		   <author initials="M." surname="Ounsworth" fullname="M. Ounsworth">
		     <organization/>
		   </author>
		   <author initials="J." surname="Gray" fullname="J. Gray">
		     <organization/>
		   </author>
		   <author initials="S." surname="Mister" fullname="S. Mister">
		     <organization/>
		   </author>
		   <date month="February" year="2022"/>
		 </front>
		 <refcontent>draft-ounsworth-pq-explicit-composite-keys-01 (work in progress)</refcontent>
	  </reference>
	  <reference anchor="I-D.draft-becker-guthrie-cert-binding-for-multi-auth" target="https://www.ietf.org/id/draft-becker-guthrie-cert-binding-for-multi-auth-00.html?msclkid=7087159baa0811ec80e34c1337d919a5#name-authors-addresses-5">
         <front>
            <title>Binding Certificates for Multiple Authentications within a Protocol</title>
			<author initials="A." surname="Becker" fullname="A. Becker">
              <organization/>
            </author>
			<author initials="R." surname="Guthrie" fullname="R. Guthrie">
              <organization/>
            </author>
		    <author initials="M." surname="Jenkins" fullname="M. Jenkins">
              <organization/>
            </author>
            <date month="March" year="2022"/>
         </front>
		 <refcontent>draft-becker-guthrie-cert-binding-for-multi-auth-00 (work in progress)</refcontent>
      </reference>-->
	  <reference anchor="I-D.draft-becker-guthrie-noncomposite-hybrid-auth" target="https://www.ietf.org/id/draft-becker-guthrie-noncomposite-hybrid-auth-00.html?msclkid=8114e302aa0611ecbea583d810632940">
         <front>
            <title>Non-Composite Hybrid Authentication in PKIX and Applications to Internet Protocols</title>
			<author initials="A." surname="Becker" fullname="A. Becker">
              <organization/>
            </author>
			<author initials="R." surname="Guthrie" fullname="R. Guthrie">
              <organization/>
            </author>
		    <author initials="M." surname="Jenkins" fullname="M. Jenkins">
              <organization/>
            </author>
            <date month="March" year="2022"/>
         </front>
		 <refcontent>draft-becker-guthrie-noncomposite-hybrid-auth-00 (work in progress)</refcontent>
      </reference>
	  </references>
    </references>
 </back>
</rfc>